Application Security News and Articles


Apache Kafka Arbitrary File Read and SSRF Vulnerability (CVE-2025-27817)

Overview Recently, NSFOCUS CERT detected that Apache issued a security bulletin to fix the arbitrary file read and SSRF vulnerabilities in Apache Kafka (CVE-2025-27817); Because the Apache Kafka client does not strictly validate and restrict user ...

Sentra boosts regulatory readiness for large enterprises

Sentra launched its DSAR automation capability, purpose-built to help large, complex organizations respond to Data Subject Access Requests (DSARs) under regulations such as GDPR, CCPA, and other global privacy mandates. This new capability ...

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA

Industrial solutions providers Siemens, Schneider Electric and Aveva have released June 2025 Patch Tuesday ICS security advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA appeared first on ...

Red Canary AI agents accelerate incident response

Red Canary unveiled a new suite of expert AI agents. These specialized agents combine the speed and scalability of agentic AI with the quality and consistency of standard operating procedures derived from Red Canary’s elite team of security ...

Vanta AI Agent automates time-consuming GRC workflows

Vanta announced the Vanta AI Agent, marking a major leap forward in how security and compliance teams leverage AI to minimize human error and maximize impact. The Vanta AI Agent autonomously handles end-to-end workflows across a company’s ...

From Puppeteer stealth to Nodriver: How anti-detect frameworks evolved to evade bot detection

Browser automation tools like Puppeteer, Playwright, and Selenium are widely used for testing, scraping, and other automation tasks. However, because they were not designed with stealth in mind, they often expose detectable traces. These can ...

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained by the OWASP community, Nettacker helps security pros automate common tasks like port ...

The path to better cybersecurity isn’t more data, it’s less noise

In cybersecurity, there’s an urge to collect as much data as possible. Logs, alerts, metrics, everything. But more data doesn’t necessarily translate to better security. SOCs deal with tens of thousands of alerts every day. It’s ...

How to build AI into your business without breaking compliance

AI is supposed to make businesses faster, smarter, and more competitive, but most projects fall short. The Cloud Security Alliance (CSA) says the real issue is companies cramming AI into old, rigid processes that just can’t keep up. “AI ...

How IP Geolocation Enhances Password Security

Discover how IP geolocation strengthens password security by detecting suspicious login attempts, reducing fraud risks, and enhancing user authentication. The post How IP Geolocation Enhances Password Security appeared first on Security Boulevard.

Patch Tuesday Update – June 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 69 CVEs, including 3 republished CVEs. Overall, Microsoft announced 2 Zero-Day, 10 Critical, and 57 Important vulnerabilities. From an Impact perspective, ...

AI forces IT leaders to rethink their network strategies

As AI assistants, agents, and data-driven workloads reshape how work gets done, they’re creating more latency-sensitive, and more complex network traffic, according to Cisco. Cisco research highlights Combined with the ubiquity of connected ...

86% of all LLM usage is driven by ChatGPT

ChatGPT remains the most widely used LLM among New Relic customers, making up over 86% of all tokens processed. Developers and enterprises are shifting to OpenAI’s latest models, such as GPT-4o and GPT-4o mini, even when more affordable ...

How Scammers Are Using AI to Steal College Financial Aid

Fake college enrollments have been surging as crime rings deploy “ghost students” — chatbots that join online classrooms and stay just long enough to collect a financial aid check. The post How Scammers Are Using AI to Steal College ...

Why agent fabrics and registries are central to AI identity security

The age of agentic AI is here — and it’s changing everything about how we secure identity. As AI agents begin to perform sensitive tasks once reserved for humans — from making purchases to deploying code — they must be treated as ...

Why Threat Agents Must be Included in Cybersecurity Risk Assessments

In the ever-evolving landscape of cybersecurity, organizations face a constant struggle: how to best allocate limited resources to maximize their defensive posture. No one has enough budget, personnel, or tools to defend against every conceivable ...

AI Ready: The Complete Guide to AI-Powered Cybersecurity Training in 2025/2026

Introduction: The AI Cybersecurity Crisis The cybersecurity landscape has fundamentally changed. AI-powered cyberattacks are projected to surge by 50% in 2024 compared to 2021, with Gartner research showing a 63% increase since 2023. Meanwhile, ...

Why Users Are Satisfied with Secure NHIs

Is Securing Non-Human Identities (NHIs) the Key to User Satisfaction? I can attest to the increasing importance of NHIs. Machine identities, as they’re often referred to, are integral to the security of organizations operating. But how does ...

Capabilities Unlocked by Advanced NHI Management

How Can NHI Management Unlock Advanced Security Capabilities? Ever considered the security measures that stand behind extensive data networks? A key component of this invisible fortress is the Non-Human Identity (NHI) which, armed with its own ...

Innovative Approaches to NHI Protection

Will Rising Cybercrimes Warrant a More Innovative Approach to NHI Protection? With the intensifying wave of cybercrimes, robust and innovative strategies are crucial in tackling these emerging threats. One area that is often overlooked yet holds ...